Kevin I. Jones

According to our database1, Kevin I. Jones authored at least 18 papers between 2005 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Introduction to the special issue of the journal of information security and applications on" cyber security in ICS & SCADA systems".
J. Inf. Secur. Appl., 2020

2019
Developing cyber peacekeeping: Observation, monitoring and reporting.
Gov. Inf. Q., 2019

Exploring the role of work identity and work locus of control in information security awareness.
Comput. Secur., 2019

2018
Defence Mechanisms for Public Systems.
EAI Endorsed Trans. Security Safety, 2018

An introduction to cyber peacekeeping.
J. Netw. Comput. Appl., 2018

Developing Cyber Buffer Zones.
CoRR, 2018

2017
Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems.
EAI Endorsed Trans. Security Safety, 2017

Introduction to the special issue of the journal of information security and applications on "ICS & SCADA cyber security".
J. Inf. Secur. Appl., 2017

Internet of Cloud: Security and Privacy issues.
CoRR, 2017

An Introduction to Cyber Peacekeeping.
CoRR, 2017

2016
Security, Privacy and Trust in Cyber Physical Systems.
EAI Endorsed Trans. Security Safety, 2016

Towards a Distributed Runtime Monitor for ICS/SCADA Systems.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

2015
Cyber warfare: Issues and challenges.
Comput. Secur., 2015

An Industrial Control Systems incident response decision framework.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2010
A trust based approach to mobile multi-agent systems.
PhD thesis, 2010

2009
A Property Based Framework for Trust and Reputation in Mobile Computing.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2006
A Compositional Event & Time-Based Policy Model.
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006

2005
Analysis and Run-Time Verification of Dynamic Security Policies.
Proceedings of the Defence Applications of Multi-Agent Systems, International Workshop, 2005


  Loading...